 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.

Slides:



Advertisements
Similar presentations
Computer Forensics.
Advertisements

Computer Forensics.
Intro to Computer Forensics CSC 485/585. Objectives  Understand the roles and responsibilities of a computer forensic examiner.  Understand the “Safety.
Effective Discovery Techniques In Computer Crime Cases.
Evidence Collection & Admissibility Computer Forensics BACS 371.
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
Section 3.2: Operating Systems Security
BACS 371 Computer Forensics
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Evidence Computer Forensics. Law Enforcement vs. Citizens  Search must have probable cause –4 th amendment search warrant  Private citizen not subject.
Guide to Computer Forensics and Investigations Fourth Edition
Computer Forensics Principles and Practices
You can run that from a USB Drive ? Portable Applications: the good, the bad and the ugly Jeff Gimbel © 2007.
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
COS/PSA 413 Day 16. Agenda Lab 7 Corrected –2 A’s, 1 B and 2 F’s –Some of you need to start putting more effort into these labs –I also expect to be equal.
Recovering and Examining Computer Forensic Evidence Noblett, Pollit, & Presley Forensic Science Communications October 2000 (Cited by 13 according to Google.
Chapter 14: Computer and Network Forensics
Advance evidence collection and analysis of web browser activity by Junhoon Oh David Rivera 11/7/2013 Digital Forensics.
Applying Digital Forensic techniques to AIM Gareth Knight, FIDO Project Manager Anatomy Theatre & Museum, King’s College London 15 th August 2011.
COEN 252 Computer Forensics Forensic Duplication of Hard Drives.
COEN 252 Computer Forensics
Capturing Computer Evidence Extracting Information.
Hands-on: Capturing an Image with AccessData FTK Imager
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
COEN 252 Computer Forensics Windows Evidence Acquisition Boot Disk.
Damien Leake. Definition To examine digital media to identify and analyze information so that it can be used as evidence in court cases Involves many.
COEN 252 Computer Forensics
What is FORENSICS? Why do we need Network Forensics?
Computer Forensics Iram Qureshi, Prajakta Lokhande.
Digital Crime Scene Investigative Process
Undergraduate Technology Programs John Baker Johns Hopkins University Carey Business School
COEN 252 Computer Forensics Collecting Network-based Evidence.
Data Recovery Techniques Florida State University CIS 4360 – Computer Security Fall 2006 December 6, 2006 Matthew Alberti Horacesio Carmichael.
CARNIVORE And Other Computer Spy Programs. What is Carnivore? Carnivore helps the FBI conduct ‘wiretaps’ on Internet connections. Carnivore is a computer-based.
Computer Forensics Principles and Practices
Introduction to Digital Forensics Florian Buchholz.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How.
Timeline Analysis Geoff Black, EnCE, SnortCP Senior Forensic Consultant Professional Services Division Guidance Software, Inc.
Guide to Computer Forensics and Investigations Fourth Edition
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
Forensic Procedures 1. Assess the situation and understand what type of incident or crime is to be investigated. 2. Obtain senior management approval to.
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University September 28, 2007.
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
CJ386-Unit 7 Review A questioned document is any material that contains marks, symbols or signs conveying a meaning or message and whose source or authenticity.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA Search.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 File Systems September 22, 2008.
Computer Forensics Tim Foley COSC 480 Nov. 17, 2006.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Course 03 Basic Concepts assist. eng. Jánó Rajmond, PhD
Chapter 11 Analysis Methodology Spring Incident Response & Computer Forensics.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
Digital Forensics and Hand Held Devices Robert Trimble COSC
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
Computer Forensics Discovery and recovery of digital evidence
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
FILE CARVING: Reassembling files from fragments of bytes/hex data on a digital device.
Cell Phone Analysis.
Fourth Amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Digital Forensics CJ
Chapter 17 COMPUTER FORENSICS.
Digital Forensics Andrew Schierberg, Fort Mitchell Police, Schierberg LAw Jay Downs, Kenton County Police.
Presentation transcript:

 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence of events involving computers and information Computer Forensics2

 Locard's Exchange Principle  Postulated by Edmond Locard  Director of the first crime laboratory in existence (Lyon, France)  States that everywhere you go  You take something with you -AND-  You leave something behind  Used in the world of traditional forensics  Piece the artifacts together for attribution  Collect corroborating evidence  Applies to computer forensics as well Computer Forensics3

 Disk forensics  Hard drives and other storage media  Network forensics  Log files  Network traffic  Memory forensics  Capture the contents of RAM and analyze  Mobile device forensics  Cell phones  PDA's  iPods  GPS devices Computer Forensics4

 Investigations generally progress in a certain manner  Three stages:  Acquisition  Analysis  Reporting  Each step is critical to an investigation  Must be carried out in a sound manner  Investigative work must be capable of being repeated by an independent investigator Computer Forensics5

 Collection of evidence  Evidence must be properly preserved  Chain of custody  Create a copy of the original evidence  All investigative work done on the copy  Create a logical image  Copy of files on the hard drive  Create a physical image  Exact mirror of the storage device (at the bit level)  Create a hash of the original evidence  Prove that evidence has not been tampered with  All actions (through reporting) should be logged Computer Forensics6

 Evidence examined and information extracted from the data  Basis for the report  Construct a timeline of events  Attempt to reconstruct the event using all available evidence  Must convert date/time stamps into a common time  Hash evidence periodically to ensure you aren’t changing it  Evidence MUST NEVER BE ALTERED  Often set media to read-only to prevent inadvertent changes  Consider additional evidence that must be collected Computer Forensics7

 Communicate the findings  Should be organized, concise, and UNBIASED  Adjudication venue will dictate format  Criminal court vs. internal investigation  Should include  Executive summary (easy to understand version of findings)  Timeline of events  Hashes of evidence  Unbiased detailed findings Computer Forensics8

 Registry analysis (Windows)  File carving  Recovery of deleted files  Crack passwords/defeat encryption  Examine log files  Establish patterns/determine deviations from norms  Run images in virtual machine  Observe behavior  Memory capture/analysis  See what was running on the machine Computer Forensics9

 Web browser forensics  History, cache, stored passwords, cookies, etc.  Examine hard drive using a live CD  Usually Linux distribution  Examine hard drive without booting the machine  Packet capture analysis  Router span port or intrusion detection system  analysis  Determine user activities  Search for hidden or encrypted files, steganography, alternate data streams  Create network map Computer Forensics10

 Writing over existing data with "junk" data  Re-format the drive  Software “file-shredders”  Magnetically degaussing the hard drive with a degausser  Giving the hard drive an acid bath.  Damaging the disk with fire…destruction is the only guarantee… Computer Forensics11

Computer Forensics12